Skip to content

Commit

Permalink
Test update to formatting
Browse files Browse the repository at this point in the history
  • Loading branch information
RRudder committed Aug 15, 2024
1 parent 52dc732 commit 81015af
Showing 1 changed file with 3 additions and 7 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,10 @@
# Using Components with Known Vulnerabilities

## Overview of the Vulnerability

Outdated software is common in applications that use many types of different software stacks. Many outdated software versions have well known and documented vulnerabilities, including those with Common Vulnerabilities and Exposures (CVE) IDs. An attacker can take advantage of old software versions in this application by using open source vulnerability information and CVEs to exploit the application.

## Business Impact
#### Business Impact

Outdated Software Version can lead to reputational damage for the business due to a loss in confidence and trust by users.

## Steps to Reproduce
#### Steps to Reproduce

1. Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
1. Use a browser to navigate to: {{URL}}
Expand All @@ -19,7 +15,7 @@ Outdated Software Version can lead to reputational damage for the business due t
{{response}}
```

## Proof of Concept (PoC)
#### Proof of Concept (PoC)

The screenshot(s) below demonstrates the outdated software with known vulnerabilities:

Expand Down

0 comments on commit 81015af

Please sign in to comment.